Introducing G2.ai, the future of software buying.Try now

Compare ThreatLocker Platform and Todyl Security Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(294)4.8 out of 5
Market Segments
Small-Business (61.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
Todyl Security Platform
Todyl Security Platform
Star Rating
(93)4.6 out of 5
Market Segments
Small-Business (89.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Todyl Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Todyl Security Platform excels in providing a comprehensive security solution with a single agent for multiple functionalities like EDR, SIEM, MXDR, and SASE. Users appreciate the operational convenience and the ability to enhance security across various levels without the hassle of managing multiple tools.
  • Users say that ThreatLocker Platform stands out for its robust application control features, allowing IT teams to easily manage user application activities. The unified auditing function is particularly praised for simplifying troubleshooting and tracking application history, making it a valuable tool for maintaining security compliance.
  • Reviewers mention that Todyl's case generation offers a clear timeline of events with detailed logs, which significantly aids in investigations. This feature is highlighted as a time-saver, helping users quickly identify critical information such as file paths and networking details.
  • According to verified reviews, ThreatLocker Platform is noted for its user-friendly interface and quick deployment via RMM tools. Users find it easy to secure clients effectively, with the assurance that only approved applications can run, which enhances overall security posture.
  • G2 reviewers highlight that while Todyl Security Platform has a higher quality of support, with users rating it highly for responsiveness and helpfulness, ThreatLocker Platform also receives commendable support ratings, indicating a strong commitment to customer service from both providers.
  • Users report that Todyl Security Platform's ease of setup is a significant advantage, with many finding the onboarding process intuitive and straightforward. In contrast, while ThreatLocker Platform is also easy to use, some users feel it could benefit from additional features to enhance its overall functionality.
Pricing
Entry-Level Pricing
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Todyl Security Platform
No pricing available
Free Trial
ThreatLocker Platform
Free Trial is available
Todyl Security Platform
Free Trial is available
Ratings
Meets Requirements
9.6
140
9.2
74
Ease of Use
8.3
246
8.6
75
Ease of Setup
8.5
234
8.8
75
Ease of Admin
8.6
134
8.7
73
Quality of Support
9.8
139
9.4
73
Has the product been a good partner in doing business?
9.7
132
9.4
71
Product Direction (% positive)
9.7
133
9.7
74
Features by Category
7.5
7
8.7
26
Network Management
Feature Not Available
8.8
21
3.8
7
7.4
20
8.1
7
9.0
23
6.9
6
8.5
25
Security
8.3
7
9.2
25
8.1
7
8.9
22
7.8
6
8.9
22
8.1
7
9.0
21
Identity Management
8.6
7
8.7
22
7.1
7
8.3
20
8.3
7
8.6
22
Generative AI
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Analysis
Not enough data
8.7
5
Not enough data
Not enough data
Not enough data
8.7
5
Functionality
Not enough data
7.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
8.3
5
Not enough data
7.0
5
Not enough data
Not enough data
Not enough data
8.7
5
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
58
Not enough data
Administration
9.2
55
Not enough data
8.4
49
Not enough data
9.7
55
Not enough data
8.1
52
Not enough data
8.5
56
Not enough data
Functionality
9.3
52
Not enough data
8.9
49
Not enough data
9.0
24
Not enough data
8.8
47
Not enough data
Analysis
8.1
18
Not enough data
7.8
23
Not enough data
8.5
51
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
10.0
11
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
10.0
5
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Not enough data
8.2
21
Management
Not enough data
7.9
18
Not enough data
7.9
18
Not enough data
8.7
18
Not enough data
8.9
20
Monitoring
Not enough data
7.6
15
Not enough data
7.5
17
Not enough data
9.0
20
Protection
Not enough data
9.1
20
Not enough data
8.2
16
Not enough data
8.4
18
Not enough data
8.8
16
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.8
15
8.9
49
Platform Features
9.4
15
9.5
44
8.9
14
9.1
36
9.6
15
8.1
30
8.8
14
9.1
33
9.1
15
9.7
39
7.7
14
7.6
33
Not enough data
9.9
16
Automation Capabilities
8.3
14
8.5
32
8.2
14
8.7
29
Not enough data
Not enough data
Not enough data
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control and Authentication - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance and Management - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.1
18
Components - Secure Access Service Edge (SASE)
Not enough data
9.3
14
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
10.0
6
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.3
5
Services - Endpoint Detection & Response (EDR)
Not enough data
9.3
5
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
8.9
47
Network Management
Not enough data
9.4
42
Not enough data
8.1
30
Not enough data
9.3
38
Incident Management
Not enough data
9.3
42
Not enough data
9.1
39
Not enough data
9.0
41
Security Intelligence
Not enough data
9.2
37
Not enough data
7.9
32
Not enough data
8.5
32
Not enough data
8.9
33
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Security Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
61.8%
Mid-Market(51-1000 emp.)
31.7%
Enterprise(> 1000 emp.)
6.5%
Todyl Security Platform
Todyl Security Platform
Small-Business(50 or fewer emp.)
89.5%
Mid-Market(51-1000 emp.)
9.2%
Enterprise(> 1000 emp.)
1.3%
Reviewers' Industry
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
37.5%
Computer & Network Security
19.1%
Hospital & Health Care
4.1%
Accounting
3.1%
Government Administration
2.7%
Other
33.4%
Todyl Security Platform
Todyl Security Platform
Information Technology and Services
53.9%
Computer & Network Security
34.2%
Consulting
2.6%
Law Practice
2.6%
Security and Investigations
1.3%
Other
5.3%
Alternatives
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Todyl Security Platform
Todyl Security Platform Alternatives
Huntress Managed EDR
Huntress Managed EDR
Add Huntress Managed EDR
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos MDR
Sophos MDR
Add Sophos MDR
Discussions
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
Todyl Security Platform
Todyl Security Platform Discussions
Monty the Mongoose crying
Todyl Security Platform has no discussions with answers